/third_party/selinux/libselinux/src/ |
D | compute_av.c | 17 struct av_decision *avd) in security_compute_av_flags_raw() argument 56 &avd->allowed, &avd->decided, in security_compute_av_flags_raw() 57 &avd->auditallow, &avd->auditdeny, in security_compute_av_flags_raw() 58 &avd->seqno, &avd->flags); in security_compute_av_flags_raw() 63 avd->flags = 0; in security_compute_av_flags_raw() 73 map_decision(tclass, avd); in security_compute_av_flags_raw() 88 struct av_decision *avd) in security_compute_av_raw() argument 96 avd->allowed = lavd.allowed; in security_compute_av_raw() 97 avd->decided = lavd.decided; in security_compute_av_raw() 98 avd->auditallow = lavd.auditallow; in security_compute_av_raw() [all …]
|
D | avc.c | 23 struct av_decision avd; member 435 if (node && ((node->ae.avd.decided & requested) == requested)) { in avc_lookup() 474 if (ae->avd.seqno < avc_cache.latest_notif) { in avc_insert() 477 ae->avd.seqno, avc_cache.latest_notif); in avc_insert() 489 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd)); in avc_insert() 694 struct av_decision *avd, int result, void *a) in avc_audit() argument 698 denied = requested & ~avd->allowed; in avc_audit() 700 audited = denied & avd->auditdeny; in avc_audit() 704 audited = requested & avd->auditallow; in avc_audit() 736 static void avd_init(struct av_decision *avd) in avd_init() argument [all …]
|
D | mapping.c | 209 map_decision(security_class_t tclass, struct av_decision *avd) in map_decision() argument 218 if (avd->allowed & mapping->perms[i]) in map_decision() 223 avd->allowed = result; in map_decision() 226 if (avd->decided & mapping->perms[i]) in map_decision() 231 avd->decided = result; in map_decision() 234 if (avd->auditallow & mapping->perms[i]) in map_decision() 236 avd->auditallow = result; in map_decision() 239 if (avd->auditdeny & mapping->perms[i]) in map_decision() 252 avd->auditdeny = result; in map_decision()
|
D | checkAccess.c | 75 struct av_decision avd; in selinux_check_passwd_access_internal() local 90 &avd); in selinux_check_passwd_access_internal() 92 if ((retval == 0) && ((requested & avd.allowed) == requested)) { in selinux_check_passwd_access_internal()
|
D | audit2why.c | 67 struct sepol_av_decision avd; in check_booleans() local 113 avc->av, &avd, &reason); in check_booleans() 322 struct sepol_av_decision avd; in analyze() local 376 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); in analyze() 389 if (av & ~avd.auditdeny) { in analyze()
|
D | mapping.h | 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
/third_party/selinux/libselinux/utils/ |
D | compute_av.c | 11 struct av_decision avd; in main() local 37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); in main() 44 print_access_vector(tclass, avd.allowed); in main() 47 if (avd.decided != ~0U) { in main() 49 print_access_vector(tclass, avd.decided); in main() 53 if (avd.auditallow) { in main() 55 print_access_vector(tclass, avd.auditallow); in main() 59 if (avd.auditdeny != ~0U) { in main() 61 print_access_vector(tclass, avd.auditdeny); in main()
|
/third_party/selinux/libsepol/utils/ |
D | sepol_compute_av.c | 15 struct sepol_av_decision avd; in main() local 50 rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 53 printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed)); in main() 54 printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided)); in main() 55 printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow)); in main() 56 printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny)); in main()
|
D | sepol_check_access.c | 17 struct sepol_av_decision avd; in main() local 86 if (sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0) < 0) { in main() 91 if ((avd.allowed & av) == av) { in main()
|
/third_party/selinux/libsepol/src/ |
D | services.c | 844 struct sepol_av_decision *avd, 853 struct sepol_av_decision *avd, in type_attribute_bounds_av() argument 889 masked = ~lo_avd.allowed & avd->allowed; in type_attribute_bounds_av() 895 avd->allowed &= ~masked; in type_attribute_bounds_av() 908 struct sepol_av_decision *avd, in context_struct_compute_av() argument 931 avd->allowed = 0; in context_struct_compute_av() 932 avd->decided = 0xffffffff; in context_struct_compute_av() 933 avd->auditallow = 0; in context_struct_compute_av() 934 avd->auditdeny = 0xffffffff; in context_struct_compute_av() 935 avd->seqno = latest_granting; in context_struct_compute_av() [all …]
|
D | conditional.c | 862 struct sepol_av_decision *avd) in cond_compute_av() argument 866 if (!ctab || !key || !avd) in cond_compute_av() 873 avd->allowed |= node->datum.data; in cond_compute_av() 881 avd->auditdeny &= node->datum.data; in cond_compute_av() 884 avd->auditallow |= node->datum.data; in cond_compute_av()
|
D | expand.c | 3217 avtab_datum_t *avd; in expand_avtab_insert() local 3252 avd = &node->datum; in expand_avtab_insert() 3257 avd->data |= d->data; in expand_avtab_insert() 3260 avd->data &= d->data; in expand_avtab_insert() 3361 avtab_datum_t *avd; in expand_cond_insert() local 3386 avd = &node->datum; in expand_cond_insert() 3390 avd->data |= d->data; in expand_cond_insert() 3393 avd->data &= d->data; in expand_cond_insert()
|
/third_party/flutter/flutter/packages/flutter_tools/test/general.shard/android/ |
D | android_emulator_test.dart | 32 'avd.ini.displayname': displayName, 46 'avd.ini.displayname': displayName, 57 'avd.ini.notadisplayname': 'this is not a display name', 69 avd.ini.displayname = dispName 74 expect(results['avd.ini.displayname'], 'dispName');
|
D | android_device_test.dart | 605 /// "avd name" requests with the supplied name. 609 // Include OK in the same packet here. In the response to "avd name" 623 if (text == 'avd name\n') {
|
/third_party/selinux/libsepol/include/sepol/policydb/ |
D | services.h | 45 struct sepol_av_decision *avd); /* OUT */ 57 struct sepol_av_decision *avd, 73 struct sepol_av_decision *avd,
|
D | conditional.h | 138 struct sepol_av_decision *avd);
|
/third_party/selinux/libselinux/include/selinux/ |
D | selinux.h | 194 struct av_decision *avd); 199 struct av_decision *avd); 205 struct av_decision *avd); 210 struct av_decision *avd);
|
D | avc.h | 276 struct avc_entry_ref *aeref, struct av_decision *avd); 321 struct av_decision *avd, int result, void *auditdata);
|
/third_party/flutter/flutter/packages/flutter_tools/lib/src/android/ |
D | android_console.dart | 24 /// commands such as "avd name" which are not available to ADB. 45 _write('avd name\n');
|
D | android_emulator.dart | 38 String get name => _prop('avd.ini.displayname') ?? id.replaceAll('_', ' ').trim(); 54 processManager.run(<String>[getEmulatorPath(), '-avd', id])
|
D | android_device.dart | 160 printTrace('Fetching avd name for $name via Android console on $host:$port'); 175 onTimeout: () => throw TimeoutException('"avd name" timed out')); 180 printTrace('Failed to fetch avd name for emulator at $host:$port: $e');
|
/third_party/flutter/flutter/packages/flutter_tools/test/general.shard/ |
D | emulator_test.dart | 95 await emulatorManager.createEmulator(name: 'existing-avd-1'); 197 final List<String> _existingAvds = <String>['existing-avd-1']; 234 if (_equality.equals(args, <String>['create', 'avd', '-n', 'temp'])) { 239 <String>['create', 'avd', '-n', args[3], '-k', args[5], '-d', args[7]])) {
|
/third_party/selinux/checkpolicy/ |
D | checkpolicy.c | 388 struct sepol_av_decision avd; in main() local 792 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 796 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) { in main() 797 if (avd.allowed & (UINT32_C(1) << (i - 1))) { in main() 1204 tclass, 0, &avd, &reason, in main()
|
/third_party/rust/crates/libc/ci/ |
D | android-install-sdk.sh | 68 ./sdk/cmdline-tools/tools/bin/avdmanager create avd \
|
/third_party/flutter/flutter/packages/flutter_tools/lib/src/ |
D | emulator.dart | 116 'avd', 165 'avd',
|